A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ . Group of answer choices analysis integrity masquerade encryption